• Home
  • Become a Hacker
    • Get Started
    • Hacker Mindset
    • Roadmap
    • Simple Setup – Hacker 101
    • Types of Hackers
    • Recommended Courses
  • Boot People Offline
  • Courses
    • All Hacking Courses
    • Cyber Security School
  • CTF
    • Beginners to Advanced Guide
    • Create your own CTF box
    • Field and Resources Guide
    • Platforms & Wargames
    • Tools Used for Solving CTF
    • Writeups
  • Dark Web
    • Beginners Guide
    • Darknet Markets
    • Darkweb 101 (Anonymity Guide)
    • Dark Web OSINT Tools
    • Hacking Forums
    • Latest News
    • Onion Links
  • Hacker Gadgets
  • Hacking Books
  • Tools Directory
Menu
  • Home
  • Become a Hacker
    • Get Started
    • Hacker Mindset
    • Roadmap
    • Simple Setup – Hacker 101
    • Types of Hackers
    • Recommended Courses
  • Boot People Offline
  • Courses
    • All Hacking Courses
    • Cyber Security School
  • CTF
    • Beginners to Advanced Guide
    • Create your own CTF box
    • Field and Resources Guide
    • Platforms & Wargames
    • Tools Used for Solving CTF
    • Writeups
  • Dark Web
    • Beginners Guide
    • Darknet Markets
    • Darkweb 101 (Anonymity Guide)
    • Dark Web OSINT Tools
    • Hacking Forums
    • Latest News
    • Onion Links
  • Hacker Gadgets
  • Hacking Books
  • Tools Directory
Search
Close
  • Home
  • 2015
  • February
  • 10
  • Website Hacking Methods

Website Hacking Methods

February 10, 2015November 18, 2017 Comments Off on Website Hacking Methods
AFD Cross Site Scripting LFI PCI RCE RFI SCD sql Website defacement website hacking Website Hacking Methods XSS

Today i’m going to teach you some basics of website hacking , so first , we going to learn about website defacement.

website-defaced

1) What is Website defacement ?

A website defacement is an attack on a website that changes the visual
appearance of the site. These are typically the work of system crackers,
who break into a web server and replace the hosted website with one of
their own.

A high-profile website defacement was carried out on the website of the
company SCO Group following it’s assertion that Linux contained stolen
code. The title of the page was changed from “Red Hat vs SCO” to “SCO vs
World,” with various satirical content following.

2)  Terms to be used

[SQL] – Structured Query Language

[LFI] – Local File Include

[RFI] – Remote File Include

[XSS] – Cross Site Scripting

[RCE] – Remote Code Execution

[AFD] – Arbitrary File Download

[SCD] – Source Code Disclosure

[PCI] – PHP Code Injection

3) Defacement techniques ?

I).Domain Hacking

II).FTP Protocol

III).Apache Vulnerable

IV).Script, Cookie, XSS

V).Social Engineering.

VI).SQL Injection

VII).RFI.

I) What is Domain Hacking ?

A Domain hacking is a process to transfer domain(yahoo.com) without owner permission with help of phishing, sniffing,spoofing.

A domain hack is an unconventional domain name that combines domain
levels, especially the top-level domain (TLD), to spell out the full
“name” or title of the domain, making a kind of fun.

Domain Hacking process

a) See who.is record of Slave(XXABCXX.net) DNS record and note

down admin email (xxabcxx@gmail/ymail/hotmail/live/[whatever apply this exception if possible admin(name)@XXABCXX.net] )

b) Send spoof mail to Slave admin email for password.

c) after open domain registrar —->(my.india s.com)

<———–website to access

their domain control panel (click forget password)

d) After you get a password in Slave email address of Slave domain.

e) Just login on domain control panel.

f) and get ECCP code and create new account on hosting company

and choose Domain transfer (all submit all details)

g) You will get all rights on this domain for lifetime.

II) What is FTP Protocol ?

The File Transfer Protocol (FTP) provides the basic elements of file
sharing between hosts. FTP uses TCP to create a virtual connection for
control information and then creates a separate TCP connection for data
transfers. The control connection uses an image of the TELNET protocol
to exchange commands and messages between hosts.

for detail check this Detail about FTP

III) What is XSS ?

XSS is a type of computer security vulnerability typically found in web
applications which allow code injection by malicious web users into the
web pages viewed by other users.

Cross Site Scripting is a technique used to add script to a trusted site that will be executed

on other users browsers. A key element to XSS is that one user can submit data to a

website that will later be displayed for other users. It is nessesary that the bad guy NOT

mess up the HTML structure, otherwise the result will be web defacement rather then

attacking other users.

IV) What is Social Engineering ?

Social engineering is the act of manipulating people into doing actions or exposing confidential information. It’s trickery or deception to gather information, fraud, or computer system access where in the hacker never comes face-to-face with the Slave.

V) What is SQL injection ?

SQL injection is a type of security exploit in which the attacker

injects Structured Query Language (SQL) code through a web form input box, to gain access to resources, or make changes to data.

It is a technique of injecting SQL commands to exploit non-validated input vulnerabilities in a web application database.

————–>Preventing SQL Injection<——————-

To protect against SQL injection, user input must not directly be
embedded in SQL statements. Instead, parameterized statements must be
used (preferred), or user input must be carefully escaped or filtered.

VI) What is RFI ?

Remote File Inclusion attacks allow malicious users to run their own PHP
code on a vulnerable website. The attacker is allowed to include his
own (malicious) code in the space provided for PHP programs on a web
page.

 

Hope that sums it up in a good way of possibly all the methods that work.

 

Happy Hacking !!

Post navigation

How to get an IP over Xbox live
How to manually bypass Anti-Virus

Related Articles

Cazador – WebApp Pentest Toolkit

- Website Hacking
October 9, 2019

N-Stalker X – Next Generation Web Application Scanner

- Website Hacking
July 31, 2019

WAFNinja – Tool to Bypass Web Application Firewalls

- Hack Tools, Website Hacking
July 7, 2019
hacker gadgets
hacker phone covers

Recent Posts

Samba Issues Security Updates to Patch Three Vulnerabilities

Samba Issues Security Updates to Patch Three Vulnerabilities

March 31, 2023
New APT Exploits Zimbra Vulnerability to Target European Military and Diplomatic Entities

New APT Exploits Zimbra Vulnerability to Target European Military and Diplomatic Entities

March 30, 2023
MSI Dump - A Tool That Analyzes Malicious MSI Installation Packages, Extracts Files, Streams, Binary Data And Incorporates YARA Scanner

MSI Dump – A Tool That Analyzes Malicious MSI Installation Packages, Extracts Files, Streams, Binary Data And Incorporates YARA Scanner

March 30, 2023
aerleon: Generate firewall configs for multiple firewall platforms

aerleon: Generate firewall configs for multiple firewall platforms

March 30, 2023
hashtopolis v0.13.1 released: A Hashcat wrapper for distributed hashcracking

hashtopolis v0.13.1 released: A Hashcat wrapper for distributed hashcracking

March 30, 2023
Artemis: modular web reconnaissance tool and vulnerability scanner

Artemis: modular web reconnaissance tool and vulnerability scanner

March 29, 2023

Social Media Hacking

SocialPath – Track users across Social Media Platforms

SocialPath – Track users across Social Media Platforms

- Social Media Hacking
October 16, 2019October 16, 2019

SocialPath is a django application for gathering social media intelligence on specific username. It checks for Twitter, Instagram, Facebook, Reddit...

SocialScan – Check Email Address and Username Availability on Online Platforms

SocialScan – Check Email Address and Username Availability on Online Platforms

June 17, 2019
Shellphish – Phishing Tool For 18 Social Media Apps

Shellphish – Phishing Tool For 18 Social Media Apps

June 10, 2019July 27, 2019
WhatsApp Hacking using QRLJacking

WhatsApp Hacking using QRLJacking

May 2, 2019May 19, 2019
How to Hack any Facebook Account with Z-Shadow

How to Hack any Facebook Account with Z-Shadow

April 26, 2019June 29, 2020
hacker buffs

About Us

Haxf4rall is a collective, a good starting point and provides a variety of quality material for cyber security professionals.

Join Our Community!

Please wait...
Get the latest News and Hacking Tools delivered to your inbox.
Don't Worry ! You will not be spammed

Active Members

Submit a Tool

Hackers Handbook 2018


Grab your copy here

ABOUT US

Haxf4rall is a collective, a good starting point and provides a variety of quality material for cyber security professionals.

Our primary focus revolves around the latest tools released in the Infosec community and provide a platform for developers to showcase their skillset and current projects.

COMPANY
  • Contact Us
  • Disclaimer
  • Hacker Gadgets
  • LANC Remastered
  • PCPS IP Puller
  • Privacy Policy
  • Sitemap
  • Submit your Tool
Menu
  • Contact Us
  • Disclaimer
  • Hacker Gadgets
  • LANC Remastered
  • PCPS IP Puller
  • Privacy Policy
  • Sitemap
  • Submit your Tool
Live Chat
RESOURCES
  • Attack Process
  • Become a Hacker
  • Career Pathways
  • Dark Web
  • Hacking Books
  • Practice Your Skills
  • Recommended Courses
  • Simple Setup – Hacker 101
Menu
  • Attack Process
  • Become a Hacker
  • Career Pathways
  • Dark Web
  • Hacking Books
  • Practice Your Skills
  • Recommended Courses
  • Simple Setup – Hacker 101
Get Started
TOOLBOX
  • Anonymity
  • Bruteforce
  • DoS – Denial of Service
  • Information Gathering
  • Phishing
  • SQL Injection
  • Vulnerability Scanners
  • Wifi Hacking
Menu
  • Anonymity
  • Bruteforce
  • DoS – Denial of Service
  • Information Gathering
  • Phishing
  • SQL Injection
  • Vulnerability Scanners
  • Wifi Hacking
Tools Directory

2014 – 2020 | Haxf4rall.com               Stay Connected:

Facebook Twitter Google-plus Wordpress
Please wait...

Join Our Community

Subscribe now and get your free HACKERS HANDBOOK

Don't Worry ! You will not be spammed
SIGN UP FOR NEWSLETTER NOW